Privacy and Anonymity

Notes:
IB Definition:
Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent
information about themselves is shared with others. At its extreme, privacy becomes anonymity when, for
instance, a person uses it to conceal his or her true identity in order to cyber-bully someone else. Conversely,
excessive privacy could also conceal the perpetrators of criminal, terrorist or computer hacking acts from
law enforcement agencies.

Key Terms
Personal data is information that can be facts or/and opinions about an individual.

Data Subject is the individual information is collected from or stored about.

Data processor is an individual who are employed to access, use and process personal data.

Data controller is a person in charge of an organization (not necessarily), this individual decides what data the company/organization collects & what is done with that data.

The person who has responsibility of enforcing the Data Protection Act is called an Information Commissioner. A Data controller must go to a commissioner in order to gain allowance to collect & store personal data.

Top 6 Privacy Issues and there Results in 2011

Issues


1.GPS
With the rise in mobile GPS information, companies will have to protect both personally
identifiable information (PII) of employees, customers and partners, They need to create
policies that address these issues and make sure that the data is secure.

2. Social Media
According to Neilsen, nearly a quarter (22.7%) of all online time is spent social networking.
With more people on social networks and more personal information available via those networks,
the potential for exposure of that data is likely.

3.Privacy Policies
Stricter regulations will be passed worldwide. Privacy regulations in the healthcare, financial services
and critical infrastructure industries like energy and telecommunications will likely see new regulation
s dictating what needs to be protected and what to do when data loss occurs.

4. Law on Breaches
Expect a national data breach notification law. Notification laws like California’s SB 1386 exist in
46 of 50 states today. A federal law is imminent.

5. Varied Threats
While email is still the number one threat for personal information loss, threats from newer
communications channels is increasing, especially in the form of blended threats where the
target is first attacked through email, then directed to Web or social media. (This is called phishing)

6.Companies Prosecuted
At least one company a year will be prosecuted under the broad-reaching Massachusetts Privacy Law (201 CMR 17.00).
In March 2011, the Massachusetts Privacy Law went into effect, mandating that any company that “owns or licenses”
personal information—whether stored in electronic or paper form—about Massachusetts residents must comply with its
privacy requirements, including notification of breaches and encryption of stored or transmitted personal data. Although the
state has yet to enforce the law, 2011 will likely be the year that companies begin seeing penalties. In addition, we may see
more laws of this type passed in 2011. Nevada also has a similar law.

Results


7. Companies will Adapt

Companies will move away from outright bans on social networks, IM or web mail to allowing those services, but applying
stricter corporate policies on these new services as well as investing in secure web gateways to monitor use.
New innovations such as Facebook mail give enterprises yet another good reason to put better policy and technology
controls around the corporate email system.

8. Companies will create new Policies
More companies will create policy around acceptable use. Email leaks such as the recent Google corporate memo
exposure are heightening awareness in companies that policies need to be created about what content is considered
sensitive and enforce them both through technology and through training.

9. Companies will Encrypt Data
More companies will encrypt more data. Three factors are converging to make 2011 the year of encryption adoption.
More regulations today require encryption. It’s become a best practice in many industries. It’s easier to implement
and less confusing for users. With processing power increasing and companies innovating, encryption has become faster
and easier to implement and use.

10. Secured file Transfers
More interest in secure managed file transfer. Driven by privacy considerations and security flaws in FTP, more companies
will be implementing reliable ways to send files securely. With data breach notification laws in place in nearly every state,
companies cannot risk losing data through FTP security issues


Tech Blog with interesting article by J-Feldman
http://www.huffingtonpost.com/miles-j-feldman/internet-privacy_b_1306701.html

Teach ICT Privacy news list:
http://www.teach-ict.com/news/news_stories/news_dpa.htm

Data Protection Act 1998-You must know the 8 principles!!
http://www.teach-ict.com/gcse_new/legal/dpa/miniweb/index.htm

Finland Data Protection Laws-
http://www.tietosuoja.fi/27305.htm

Privacy Video




CNN Story about Online Privacy



Ever wondered what data Google's search engine collects and why we retain search logs for certain periods of time? Our first ever Brussels Tech Talk on 28 January 2010 was about this and other questions on online privacy, given that it was Data Protection Day.

Dr Alma Whitten, Google's engineering lead for privacy, addressed a full room of policy makers and other interested stakeholders. Alma demonstrated how we harness the power of data to "learn from the good guys, fight the bad guys, and invent the future".

While the technology is complicated, the explanation is simple: log data enable our engineers to refine algorithms for the benefit of all search users. If clicking on the top results occurs for any given query, it signals that we are doing something right. If people are hitting 'next page' or typing in another query, we learn something is wrong. Every time a user searches on the web, you benefit from what Google has learned from millions of previous searches. However, rather than a solved problem, the search science is still in its infancy. By launching hundreds of innovations in search just during the last year, we're constantly trying to improve search so you'll hopefully find among the first results the website that contains the answer you were looking for in midst of more than a trillion unique URLs.

We aim to always balance innovative product development with a serious respect for users' privacy. For us, this process starts with providing transparency and allowing users control. Alma explained the ways we're working to provide our users with more transparency and choice: things like the Ads Preferences Manager, Google Dashboard, and Data Liberation Front. And she referred to the challenges engineers face to achieve transparency and control with respect to different categories of data such as logged-in vs. unauthenticated data.

http://www.youtube.com/watch?v=tnsyhKHalGs - Max


Hyperlinks:

Zuckenberg's interview:
http://st-julians-itgs.wikispaces.com/1.3+Privacy+and+anonymity







HL examples: